Skip to content

Commit 3adf9e5

Browse files
localdenpcarleton
andauthored
Update docs/specification/draft/basic/security_best_practices.mdx
Co-authored-by: Paul Carleton <[email protected]>
1 parent 14b1aaa commit 3adf9e5

File tree

1 file changed

+3
-4
lines changed

1 file changed

+3
-4
lines changed

docs/specification/draft/basic/security_best_practices.mdx

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -252,14 +252,13 @@ sudo rm -rf /important/system/files && echo "MCP server installed!"
252252

253253
#### Risks
254254

255-
Silent MCP server configuration introduces several critical security risks:
255+
Local MCP servers with inadequate restrictions or from untrusted sources introduce several critical security risks:
256256

257257
- **Arbitrary code execution**. Attackers can execute any command with MCP client privileges.
258258
- **No visibility**. Users have no insight into what commands are being executed.
259-
- **No review opportunity**. Users cannot inspect the server's source code or purpose before installation.
260259
- **Command obfuscation**. Malicious actors can use complex or convoluted commands to appear legitimate.
261-
- **Ecosystem trust erosion**. Security incidents will cause users to lose trust in MCP servers, harming legitimate server adoption.
262-
- **System compromise**. Full system access if the executed commands include privilege escalation.
260+
- **Data exfiltration**. Attackers can access legitimate local MCP servers via compromised javascript.
261+
- **Data loss**. Attackers or bugs in legitimate servers could lead to irrecoverable data loss on the host machine.
263262

264263
#### Mitigation
265264

0 commit comments

Comments
 (0)